Described as tall and good-looking by some, short and sweet by others, no one in the team knows who they are. But they write great blog posts!
Sensitive data is spreading uncontrollably across SaaS applications, so check out our 101 on data minimization and storage limitations.
A bipartisan draft bill has been released outlining US federal standards governing how companies collect, process, transfer and protect data.
What does ‘good’ look like when it comes to detecting and remediating security violations?
Organizations can call on a multitude of data points to track their security posture. But that doesn’t mean they should.
Employees continue to pose one of the biggest threats to IT security. So why do organizations persist with training methods that don’t work?
Information security at a startup presents unique challenges. We look at what a newly appointed CISO should prioritise.
When finding sensitive data & PII amongst the terabytes of data flowing constantly to Snowflake becomes tech companies' most daunting data challenge.
As easy-to-use and convenient as Slack is, it’s near-impossible to see or control what information is being shared across hundreds of channels.